Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Artificial intelligence just made guessing your password a whole lot easier
Sciencemag.org ^ | 9/15/17 | Matthew Hutson

Posted on 09/17/2017 2:56:01 AM PDT by Bullish

Last week, the credit reporting agency Equifax announced that malicious hackers had leaked the personal information of 143 million people in their system. That’s reason for concern, of course, but if a hacker wants to access your online data by simply guessing your password, you’re probably toast in less than an hour. Now, there’s more bad news: Scientists have harnessed the power of artificial intelligence (AI) to create a program that, combined with existing tools, figured more than a quarter of the passwords from a set of more than 43 million LinkedIn profiles. Yet the researchers say the technology may also be used to beat baddies at their own game.

The work could help average users and companies measure the strength of passwords, says Thomas Ristenpart, a computer scientist who studies computer security at Cornell Tech in New York City but was not involved with the study. “The new technique could also potentially be used to generate decoy passwords to help detect breaches.”

The strongest password guessing programs, John the Ripper and hashCat, use several techniques. One is simple brute force, in which they randomly try lots of combinations of characters until they get the right one. But other approaches involve extrapolating from previously leaked passwords and probability methods to guess each character in a password based on what came before. On some sites, these programs have guessed more than 90% of passwords. But they’ve required many years of manual coding to build up their plans of attack.

The new study aimed to speed this up by applying deep learning, a brain-inspired approach at the cutting edge of AI. Researchers at Stevens Institute of Technology in Hoboken, New Jersey, started with a so-called generative adversarial network, or GAN, which comprises two artificial neural networks. A “generator” attempts to produce artificial outputs (like images) that resemble real examples (actual photos), while a “discriminator” tries to detect real from fake. They help refine each other until the generator becomes a skilled counterfeiter.

Giuseppe Ateniese, a computer scientist at Stevens and paper co-author, compares the generator and discriminator to a police sketch artist and eye witness, respectively; the sketch artist is trying to produce something that can pass as an accurate portrait of the criminal. GANs have been used to make realistic images, but have not been applied much to text.

The Stevens team created a GAN it called PassGAN and compared it with two versions of hashCat and one version of John the Ripper. The scientists fed each tool tens of millions of leaked passwords from a gaming site called RockYou, and asked them to generate hundreds of millions of new passwords on their own. Then they counted how many of these new passwords matched a set of leaked passwords from LinkedIn, as a measure of how successful they’d be at cracking them.

On its own, PassGAN generated 12% of the passwords in the LinkedIn set, whereas its three competitors generated between 6% and 23%. But the best performance came from combining PassGAN and hashCat. Together, they were able to crack 27% of passwords in the LinkedIn set, the researchers reported this month in a draft paper posted on arXiv. Even failed passwords from PassGAN seemed pretty realistic: saddracula, santazone, coolarse18.

Using GANs to help guess passwords is “novel,” says Martin Arjovsky, a computer scientist who studies the technology at New York University in New York City. The paper “confirms that there are clear, important problems where applying simple machine learning solutions can bring a crucial advantage,” he says.

Still, Ristenpart says “It’s unclear to me if one needs the heavy machinery of GANs to achieve such gains.” Perhaps even simpler machine learning techniques could have assisted hashCat just as much, he says. (Arjovsky concurs.) Indeed, an efficient neural net produced by Carnegie Mellon University in Pittsburgh, Pennsylavania, recently showed promise, and Ateniese plans to compare it directly with PassGAN before submitting his paper for peer review.

Ateniese says that though in this pilot demonstration PassGAN gave hashCat an assist, he’s “certain” that future iterations could surpass hashCat. That’s in part because hashCat uses fixed rules and was unable to produce more than 650 million passwords on its own. PassGan, which invents its own rules, can create passwords indefinitely. “It’s generating millions of passwords as we speak,” he says. Ateniese also says PassGAN will improve with more layers in the neural networks and training on many more leaked passwords.

He compares PassGAN to AlphaGo, the Google DeepMind program that recently beat a human champion at the board game Go using deep learning algorithms. “AlphaGo was devising new strategies that experts had never seen before,” Ateniese says. “So I personally believe that if you give enough data to PassGAN, it will be able to come up with rules that humans cannot think about.”

And if you’re worried about your own security, experts suggest ways to create strong passwords—such as by making them long (but still easy to remember)—and using two-step authentication.


TOPICS: Chit/Chat; Computers/Internet; Miscellaneous; Science
KEYWORDS: ai; passwords
Navigation: use the links below to view more comments.
first 1-2021-32 next last
Food for thought... How long before this all gets out of hand?
1 posted on 09/17/2017 2:56:01 AM PDT by Bullish
[ Post Reply | Private Reply | View Replies]

To: Bullish

Good for people with too many passwords.


2 posted on 09/17/2017 3:22:46 AM PDT by Berlin_Freeper (Happy Nobama!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bullish

AI does nothing for guessing real passwords. Real passwords do not contain words even in discombobulated forms. Real passwords are random numbers, letters and punctuation of sufficient length to prevent brute force attacks. If users want to use passwords like ‘coolarse18’ then they deserve to have their accounts broken into LOL


3 posted on 09/17/2017 3:37:02 AM PDT by Garth Tater (Gone Galt and I ain't coming back.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bullish; Berlin_Freeper

Just think where technology will be in 15 or 20 years.


4 posted on 09/17/2017 3:38:29 AM PDT by 2ndDivisionVet (You cannot invade the mainland US. There'd be a rifle behind every blade of grass.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bullish

The entire notion of password has proliferated to the point that it’s gotten out of hand. I’m not particularly prolific with my online presence as far as forums, accounts with businesses, etcetera and I have more than thirty. I’ve given up trying to keep up with them all, with their constant requests to update passwords for security. I let my system generate them and save them. They autopopulate on my Apple devices. I have no clue what the individual passwords are myself. If I’m not on one of my devices I have to go through security questions or text validation or email validation and reset it to gain access, then reset it again once back on my devices so it’ll autopopulate once again. There is no way in hell anyone can keep up with all this, which is why so many otherwise intelligent people repeat the same, too-simple to the point of obvious password on all their accounts.


5 posted on 09/17/2017 3:50:50 AM PDT by RegulatorCountry
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bullish
Food for thought...how long before it gets out of hand?

It already is.

6 posted on 09/17/2017 4:00:20 AM PDT by grania (Deplorable and Proud of It!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bullish

My company locks my access to my computer after three failed log in attempts. In addition, I have a separate log on to my computer, have a separate log on to the system and yet another separate log on to our VPN network if working remotely. All have three failed try lock outs. You have to call a company system administrator by telephone and request unlocking to regain access to the system. All three change passwords every couple months at different frequencies.

I mention this because unsaid in this article is the fact that the AI password guessing software seems to have unlimited attempts to access a computer/system with no lock out to impede them while it goes through its algorithm-driven computational gymnastics while guessing at a password.

I don’t.

Does anyone know how these AI password systems fare in a limited attempt lockout controlled access system?


7 posted on 09/17/2017 4:00:42 AM PDT by Captain Rhino (Determined effort today forges tomorrow.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Captain Rhino

Every financial institution with which I do business does the same, three failed login attempts and you’re locked out, please call (number) to confirm identity and regain access. They have quite a litany of questions, too, several of which would not be possible to guess. The only way a potential hacker would know, would be if you’d saved it on your system and they’d not just gained access to it, but knew what it was and where it was used. My credit union asks how I first heard of them, when I signed up and why, in addition to address, next of kin listed on the account, and they ask for the account number, they’ll never assume.


8 posted on 09/17/2017 4:09:16 AM PDT by RegulatorCountry
[ Post Reply | Private Reply | To 7 | View Replies]

To: Bullish

re: “Food for thought... How long before this all gets out of hand? “

How much ‘stuff’ do you leave on your phone?
How much ‘stuff’ do you leave on your computer/laptop/tablet?

Every time I have to enter a password, I select ‘do not remember’. I might not have as many needs for passwords, as some of you younger (<65) folks, but do you have your machine of choice ‘remember’ your password?

Actually, thanks to the younger, and those who demanded an easier tech life, it is already out of hand, and your privacy is screwed.


9 posted on 09/17/2017 4:34:37 AM PDT by Terry L Smith
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bullish

Another reason to use password generators for site passwords so passwords chosen are as random as possible.


10 posted on 09/17/2017 4:40:20 AM PDT by Flick Lives
[ Post Reply | Private Reply | To 1 | View Replies]

To: Captain Rhino

I have a device with a password that has exponential pauses between attempts. The first pause is one second. The second is two, third would be four seconds. And so on. So if you are guessing, it’s going to be a long time before you can overwhelm it.


11 posted on 09/17/2017 4:53:17 AM PDT by Vermont Lt (Burn. It. Down.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Terry L Smith

In my instance it’s not “remembering” the password, it’s pulling it from an encrypted keychain. Could somebody potentially gain control over one of my devices and get into an account of mine? I imagine so but it won’t be especially easy and I’m not a high-value target, I’d pretty much have to get fooled by a phishing ploy or otherwise give administrative approval, nothing like that happens on an Apple without doing so. Remember that next time you hear crowing about hacking an Apple, it’s always due to a naive or stupid user granting access. An even worse risk is a bad actor internal to one of my financial institutions gaining access, because the required information exists on that end. But, I can’t control what I can’t control. What I don control is as well in hand as it can be within reason, given that I cannot possibly remember 30 different unique passwords, some of which are required to be reset every (x) months for security purposes. So I rely on the keychain.


12 posted on 09/17/2017 5:19:11 AM PDT by RegulatorCountry
[ Post Reply | Private Reply | To 9 | View Replies]

To: Bullish

“And if you’re worried about your own security, experts suggest ways to create strong passwords—such as by making them long (but still easy to remember)—and using two-step authentication.”

So, how does one construct “long but easy to remember passwords”? Not hard to construct one. Two is still fairly easy. I must have 50 passwords. Each is supposed to be unique. Each user name is supposed to be unique as well. Not only would I have to remember each password and username, I also would have to remember which one goes with which system.

I wonder how many “experts” follow their own advice?


13 posted on 09/17/2017 5:27:30 AM PDT by DugwayDuke ("A man hears what he wants to hear and disregards the rest")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Captain Rhino
My company locks my access to my computer after three failed log in attempts. In addition, I have a separate log on to my computer, have a separate log on to the system and yet another separate log on to our VPN network if working remotely. All have three failed try lock outs. You have to call a company system administrator by telephone and request unlocking to regain access to the system. All three change passwords every couple months at different frequencies.

Hmm, it sounds like your company is pretty lax when it actually comes to resetting your password.

If I lock myself out of the system, I physically have to go to the IT department and have my fingerprint scanned before they will unlock it. And we have 2-step authentication at work: our CAC card and a PIN. It is conceivable that one could guess the PIN, but the card encryption is more difficult to crack--especially since I keep my card in an RFID proof sleeve when I am not using it. Yes, I do work for the government.

14 posted on 09/17/2017 5:28:34 AM PDT by exDemMom (Current visual of the hole the US continues to dig itself into: http://www.usdebtclock.org/)
[ Post Reply | Private Reply | To 7 | View Replies]

To: DugwayDuke

15 posted on 09/17/2017 5:59:55 AM PDT by null and void (I don't expect to live in a safe world. I expect to live in a free country. Respect the Constitution)
[ Post Reply | Private Reply | To 13 | View Replies]

To: Bullish; All
I adopted two-factor authentication a decade ago and selected YubiKey. I opted to use their physical tokens, a little USB dongle that generates a very long one time code each time you use it to access a site. The system integrates nicely with various password manager programs.

The big downside is not having a key with you when you need it. I keep one on my company badge retractor, one on my personal keychain, and one in a living room endtable. The keys are unlabeled, so if you lose one the finder/thief won't know who it belongs to (assuming you keep all identification odd your keychain). Without the physical key, I'm not getting into my systems (unless I remember the person). My PW manager generates very long and impossible to remember passwords for sites, too.

YubiCo


16 posted on 09/17/2017 6:11:29 AM PDT by ProtectOurFreedom
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bullish
There is something even more sinister happening on the internet. "It" happened to me.

When it comes to passwords, I don't do anything where if someone cracked my password they would be able to access any important private information about me and/or my family. I don't communicate any important information via e-mail, and I don't do Facebook or Twitter or any other social network interaction.

But, my problem is regarding what Google did last week.

My wife looked at our bank statement online. She noticed a charge for about $40. She was stunned that I had applied to and got charged for YouTube TV service. I did not.

Okay, maybe I did, in a way. What I did was to apply for a "trial" service of YouTube. And I expected that I could go and use that trial service to see if it was worthwhile getting it to replace my cable TV service. After browsing through the YouTube lineup, I decided immediately that I did not want that awful and limited service. So, I did not complete by trial subscription. So I thought.

Then, last week came the surprise via the Google charge on our credit card account. I HAD NEVER EVEN ENTERED ANY ACCOUNT INFORMATION in order to authorize the charges. But, the bank account showed a "recurring" monthly charge of $40, with last week being the first time the payment was drawn automatically.

Like I said, I had NEVER entered any account information to authorize any charges.

So, I called Google CS. The rep (based in the Phillipines, he told me) said that, the account information had very likely been obtained from information stored on my computer from previous use of the credit card where I had authorized "other" services (didn't have to be from Google) to use my credit card for payment. So, it turns out that Google had done a scan of my computer information to find a credit card that could be used to pay for the YouTube TV service. Like I said, I never did authorize any payment and I had not even entered any information into Google to authorize the recurring payments.

Google took the liberty of using, WITHOUT AUTHORIZATION, account information which had been recorded on my computer from some previous payment which I had made to "other" services. That was a huge surprise, and I was very angry that Google could be so invasive. I never trusted Google before, and I trust them even less. However, that taught me a lesson about making any kind of payments online to any other service. And I won't do it again. If my account information is being retained on my computer without my knowing it, I don't want to risk it being used in the future without authorization.

If I want to set up any kind of recurring payments, I'm going old school and doing them directly via the bank and not some online service. But now, I'm rethinking even that procedure, since, if I can view account information via online banking, what is there to say that even that information is not being recorded and "made available" for future "unauthorized" purchases.

Needless to say I called Google and cancelled the YouTube service which I had NOT really purchased, and that first payment was going to be refunded. The only good thing I can say regarding the whole experience is that, the rep was very kind and thoughtful, and I appreciate HIS service.

Lesson learned. Never again.
17 posted on 09/17/2017 6:34:51 AM PDT by adorno (w)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Garth Tater
AI does nothing for guessing real passwords. Real passwords do not contain words even in discombobulated forms. Real passwords are random numbers, letters and punctuation of sufficient length to prevent brute force attacks. If users want to use passwords like ‘coolarse18’ then they deserve to have their accounts broken into LOL


18 posted on 09/17/2017 6:37:37 AM PDT by grey_whiskers (The opinions are solely those of the author and are subject to change without notice.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: exDemMom

Sorry if I gave the wrong impression. The phone call to local IT service desk is just to unlock the account so I can try again. Screening questions to establish identity are asked Cannot reasonably go to local IT department physically as it is a 50 mile one way trip from my office to their location.

Changing the password can be done online once I am admitted to the system by entering the correct password at two separate control portals. We use CAC and PINs for routine Govt unclassified system access. Access to the VPN is two part: password and a changing random number generated from an application tied to a pre-registered verified identity.


19 posted on 09/17/2017 8:24:11 AM PDT by Captain Rhino (Determined effort today forges tomorrow.)
[ Post Reply | Private Reply | To 14 | View Replies]

To: ProtectOurFreedom

Your link does NOT work...YubiKey


20 posted on 09/17/2017 8:38:37 AM PDT by goodnesswins (Say hello to President Trump)
[ Post Reply | Private Reply | To 16 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-32 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson